An Intrusion Detection System (IDS) is a crucial element of a network security posture. Although there are many IDS products available, it is rather difficult to find information ...
For a large number of data management problems, it would be very useful to be able to obtain a few samples from a data set, and to use the samples to guess the largest (or smalles...
We investigate randomised algorithms for subset matching with spatial point sets—given two sets of d-dimensional points: a data set T consisting of n points and a pattern P consi...
Abstract. Finite mixture models can be used in estimating complex, unknown probability distributions and also in clustering data. The parameters of the models form a complex repres...
In this paper a fuzzy quantization dequantization criterion is used to propose an evaluation technique to determine the appropriate clustering algorithm suitable for a particular ...
The paper focusses on a group of segmentation problems dealing with 3D data sets showing thin objects that appear disconnected in the data due to partial volume effects or a large...
We have developed a novel framework for medical image analysis, known as Shells and Spheres. This framework utilizes spherical operators of variable radius centered at each image ...
Aaron Cois, Ken J. Rockot, John M. Galeotti, Rober...
— This work is motivated by the interest in finding significant movements in financial stock prices. The detection of such movements is important because these could represent...
We describe a method to retrieve images found on web pages with specified object class labels, using an analysis of text around the image and of image appearance. Our method dete...
We present ProtCV (Protein Clustering and Visualization) a new software tool for grouping samples (mass spectra peak-lists) emanating from a high throughput proteomics analysis ba...
Stavroula Ventoura, Eugenia G. Giannopoulou, Elias...